| /external/chromium_org/net/cert/ |
| ct_verify_result.h | 19 // More information could be tracked here about SCTs, but for the current UI 25 // SCTs from known logs where the signature verified correctly. 27 // SCTs from known logs where the signature failed to verify. 29 // SCTs from unknown logs and as such are unverifiable.
|
| ct_verifier.h | 24 // Verifies SCTs embedded in the certificate itself, SCTs embedded in a 25 // stapled OCSP response, and SCTs obtained via the 28 // SCTs. It is expected that most certificates will use only one source 32 // empty string. |result| will be filled with the SCTs present, divided into
|
| multi_log_ct_verifier.h | 50 // Verify a list of SCTs from |encoded_sct_list| over |expected_entry|, 51 // placing the verification results in |result|. The SCTs in the list
|
| ct_log_verifier.h | 26 // Class for verifying Signed Certificate Timestamps (SCTs) provided by a
|
| ct_serialization.h | 53 // string in |input| to a vector of individually-encoded SCTs |output|.
|
| multi_log_ct_verifier.cc | 75 // Log to Net Log, after extracting SCTs but before possibly failing on 134 // XXX(rsleevi): Should we really just skip over bad SCTs?
|
| ct_signed_certificate_timestamp_log_param.cc | 114 // Given a list of SCTs, return a ListValue instance where each item in the
|
| multi_log_ct_verifier_unittest.cc | 74 //XXX(eranm): entries[1] is the NetLog message with the checked SCTs.
|
| /external/chromium_org/content/public/browser/ |
| signed_certificate_timestamp_store.h | 24 // track of the SCTs associated with loaded resources. It can be accessed from 26 // overflow if we register more than 2^32 - 1 SCTs in 1 browsing session (which
|
| /external/chromium_org/chrome/browser/ui/website_settings/ |
| website_settings.cc | 75 const content::SignedCertificateTimestampIDStatusList& scts, 78 scts.begin(); 79 it != scts.end(); 89 const content::SignedCertificateTimestampIDStatusList& scts, 91 // No SCTs - no CT information. 92 if (scts.empty()) 96 if (CertificateTransparencyStatusMatch(scts, net::ct::SCT_STATUS_OK)) 100 if (CertificateTransparencyStatusMatch(scts, net::ct::SCT_STATUS_INVALID)) 110 // SITE_IDENTITY_STATUS_EV_CERT depending on |is_ev| unless there are SCTs 114 const content::SignedCertificateTimestampIDStatusList& scts, [all...] |
| /external/chromium_org/net/socket/ |
| ssl_client_socket_nss.h | 150 // SCTs are held in three separate vectors in ct_verify_result, each 152 // each of the SCTs with the corresponding SCTVerifyStatus as it adds it to
|
| ssl_client_socket.h | 174 // True if SCTs were received via a TLS extension.
|
| ssl_client_socket_nss.cc | [all...] |
| /external/chromium_org/net/third_party/nss/patches/ |
| signedcertificatetimestamps.patch | 166 + SECItem *scts = &ss->xtnData.signedCertTimestamps; 167 + PORT_Assert(!scts->data && !scts->len); 173 + *scts = *data;
|
| /external/chromium_org/net/test/spawned_test_server/ |
| base_test_server.h | 158 // Temporary glue for testing: validation of SCTs is application-controlled
|
| /external/chromium_org/net/http/ |
| http_response_info.cc | 91 // This bit is set if ssl_info has SCTs.
|
| /external/chromium_org/net/data/ssl/certificates/ |
| README | 235 embedded SCTs, followed by the issuer certificates chain.
|
| /external/chromium_org/net/third_party/nss/ssl/ |
| ssl3ext.c | 2422 SECItem *scts = &ss->xtnData.signedCertTimestamps; local [all...] |
| /frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
| IccUtils.java | 98 * "if the MS receives a non-integer value in the SCTS, it shall
|
| /frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
| IccUtils.java | 98 * "if the MS receives a non-integer value in the SCTS, it shall
|
| /external/chromium_org/net/base/ |
| net_log_event_type_list.h | 576 // "verified_scts": <A list of SCTs>, 577 // "invalid_scts": <A list of SCTs>, 578 // "scts_from_unknown_logs": <A list of SCTs>, [all...] |